Atomic Object Show Nav
Close Menu
< Blog Home
Atomic Object
  • AI Software Development
  • New Product Development
  • Product Enhancement
  • Product Modernization
  • Web App
  • Mobile App
  • IoT Software
  • Desktop App
  • Cloud
  • Healthcare
  • Financial Services
  • Education
  • Insurance
  • See more...
Portfolio
Team
Culture
Contact
We're Hiring
Atomic Object Atomic Object
Services
  • Offerings
  • AI Software Development
  • New Product Development
  • Product Enhancement
  • Product Modernization
  • Platforms
  • Web App
  • Mobile App
  • IoT Software
  • Desktop App
  • Cloud
  • Industries
  • Healthcare
  • Financial Services
  • Education
  • Insurance
  • See more...
Portfolio
Team
Culture
We're Hiring
Blog
Contact
Atomic Object
Services
Portfolio
Team
Culture
We're Hiring
Blog
Contact
← Back to Blog Home

security

Development

You Should Be Using a Reentrancy Guard in Your Smart Contracts

A reentrancy guard prevents more than one function from being executed at a time and eliminates the possibility of exploiting a recursive call.
Evolving the Industry

Not Your Keys, Not Your Crypto

It's important to learn how to properly store your cryptocurrencies. Here is a helpful guide to secure your assets for years to come.
DevOps & System Admin.

How TOTP Systems Like Google Authenticator Work

A history of the HOTP one-time password method, how the current TOTP system works, and a few risks inherent to the TOTP approach.
Personal Optimization

Staying (Digitally) Safe During COVID-19 – Four Steps to Personal Cyber Security

Cyber threats and scams have escalated during the COVID-19 pandemic. Here are are some tips and advice on what you can do to stay secure.
Development Practices

Security Hygiene for Software Professionals

Taking responsibility for your security hygiene is essential and not very difficult. Here are 7 things you should start doing as soon as possible.
Web Apps

Safely Binding Unescaped Content in Web Applications

Understanding cross-site scripting (XSS) vulnerability, when binding unescaped content is safe, and how to bypass warnings in Angular and Ember.
Technical Practices

5 Ways Atomic Object Keeps Your App Secure

Atomic takes security concerns very seriously and uses a number of patterns and practices to ensure that the software we write is safe and secure.
Personal Optimization

Understanding the 3 Main Types of Encryption

An overview of symmetric encryption, asymmetric encryption, and hashing — how they work and why you need all three to create secure systems.
DevOps & System Admin.

Shellshock – CVEs, Patches, Updates, & Other Resources

Shellshock endangers un-patched web servers and Linux devices. So what is it? How can you tell if you’re vulnerable? And how can it be addressed?
DevOps & System Admin.

Debian and Ubuntu Automatic Security Updates

Automatic security updates for Debian and Ubuntu with unattended-upgrades provides an easy way to keep your servers patched against recent vulnerabilities.
DevOps & System Admin.

GPG + Git: The pass Password Manager

A lightweight password manager leveraging the strengths of GnuPG and Git can help make the password-protected world a little better.
DevOps & System Admin.

9 OpenSSL Commands To Keep Handy

OpenSSL commands are used frequently for managing SSL certificates. This reference demonstrates the usage of several key commands and options.

Posts navigation

← Older posts
Newer posts →

Want to see what Atomic can do?

Check out some of our work

Atomic's Portfolio

Atomic is a software design + development consultancy.

© 2025 Atomic Object LLC
Explore
  • Careers
  • Diversity
  • Resources
  • Atomic Blog
  • Developer Resources
  • Client Resources
Offices
  • Grand Rapids
  • Ann Arbor
  • Chicago
  • Raleigh-Durham
Details
  • Contact
  • Media
  • Privacy Policy
Certified B Corporation